Archives

Three ways to enhancing your risk registers

We wrote a paper with 10 rules to enhance risk assessments and today we will focus on three ways to enhancing your risk registers, namely rules #3, 5, 6. We have selected three rules out of ten of the original paper based on issues various delegates focused on at a recent conference. Of course we invite you to read the full paper and review your risk registers. Your projects/operation/company will greatly benefit from this action once the dust settles. Three ways…

Read More

Managing risks across the mining and oil & gas lifecycle

I had the honour to chair one of Managing risks across the mining and oil & gas lifecycle conference in London last week. The session’s title was Managing our wastes for the long term. Managing risks across the mining and oil & gas lifecycle The conference was held at the Imperial College within the frame of The Geological Society “Year of Risk” and the Institute of Risk Management. The conference’s aim was to bring together Mining and Oil & Gas…

Read More

Sendai Framework for Disaster Risk Reduction and the mining industry

This “Sendai Framework for Disaster Risk Reduction and the mining industry” blogpost looks at what constitutes a minimal requirement for a Risk Assessment applied to a mining orphan site in 2013. That occurred as a result of Public Hearings in the NWT. It then examines recent development in the field, welcoming the apparently general request for multidimensional consequence analyses. A bit of reminiscing For the reclamation of Giant Mine the MVREIB, an Environmental Review Board in Arctic Canada quoted the…

Read More

Petya’s consequences dramatically highlight risk road maps significance

The cyber world is asymmetric. A few script kiddies can have the power to launch powerful world-wide, far reaching attacks as we saw with the WannaCry ransomware case. We cannot assume perpetrators will only target political or financial interests. Perpetrators could be anywhere and everywhere. From a risk management point of view, it is irrelevant whether Petya is a cyber weapon being used to carry out cyberwarfare activities or just a ransomware. However, Petya’s consequences dramatically highlight risk road maps…

Read More

Archive

Hosted and powered by WR London.